BenchmarksStack RankingAPIsPricingTokenDocsWhite PaperBlogAboutSecurity Demo
ISO 27001

Statement of Applicability

ISO 27001 Clause 6.1.3 — Effective: March 8, 2026

Document ID: H33-SOA-001

Classification: Internal / Auditor-Accessible

Owner: Eric Beans, CEO / CISO

Approved: March 8, 2026

Next Review: March 2027

Overview

This Statement of Applicability (SoA) documents the applicability and implementation status of all 93 controls defined in ISO 27001:2022 Annex A. Each control is assessed against H33's risk treatment plan and the organization's information security requirements.

The SoA is organized by the four themes of the 2022 standard: Organizational (A.5), People (A.6), Physical (A.7), and Technological (A.8).

93
Total Controls
93
Applicable
82
Implemented
8
Partial
3
Planned

A.5 Organizational Controls (37 controls)

Control Name Appl. Status Justification / Implementation Notes
A.5.1Policies for information securityYesImplementedISMS policy suite published and approved by CEO/CISO. Includes security policy, acceptable use, access control, and data classification policies. Reviewed annually.
A.5.2Information security roles and responsibilitiesYesImplementedCEO serves as CISO. Roles and responsibilities documented in ISMS policy. Security Officer role defined with authority for incident response, policy enforcement, and audit cooperation.
A.5.3Segregation of dutiesYesImplementedIAM roles enforce segregation. Deployment requires separate approval from code review. Database admin access separated from application access. Production access restricted.
A.5.4Management responsibilitiesYesImplementedCEO/CISO approves all security policies. Management commitment documented in ISMS scope. Resource allocation for security tools (Drata, AWS security services) approved.
A.5.5Contact with authoritiesYesImplementedContact procedures established for NIST, HHS (HIPAA), state regulators, and law enforcement. Breach notification procedures documented per applicable laws.
A.5.6Contact with special interest groupsYesImplementedActive participation in NIST PQC standardization community. Monitoring of IETF working groups for TLS/PQC standards. AWS security advisory subscriptions.
A.5.7Threat intelligenceYesImplementedAWS Security Hub feeds, CVE monitoring (cargo audit, npm audit), NIST NVD subscriptions, cryptographic vulnerability tracking (lattice attacks, side-channel research).
A.5.8Information security in project managementYesImplementedSecurity requirements included in all project specifications. Cryptographic changes require Security Officer review. New features undergo threat assessment before development.
A.5.9Inventory of information and other associated assetsYesImplementedAWS asset inventory via Config and Resource Explorer. Application inventory maintained in ISMS documentation. Data classification applied to all information assets.
A.5.10Acceptable use of information and other associated assetsYesImplementedAcceptable use policy published covering computing resources, data handling, internet usage, and communication tools. All personnel acknowledge on hire.
A.5.11Return of assetsYesImplementedOffboarding checklist includes device return, access revocation (IAM, GitLab, Slack, AWS), and credential deactivation within 24 hours of termination.
A.5.12Classification of informationYesImplementedFour-tier classification: Public, Internal, Confidential, Restricted. PHI classified as Restricted. Cryptographic key material classified as Restricted. Classification labels applied to documents and data stores.
A.5.13Labelling of informationYesImplementedPolicy documents labeled with classification level. Database columns tagged for sensitivity. Log entries tagged with PHI indicators. Email classification via subject prefix for Restricted content.
A.5.14Information transferYesImplementedTLS 1.2+ for all external transfers. FHE for sensitive computation (data never decrypted in transit or at rest on server). Secure file transfer procedures documented. No plaintext PHI via email.
A.5.15Access controlYesImplementedIAM least-privilege policies. API key authentication for services. Role-based access for AWS console. MFA enforced. Access reviews quarterly.
A.5.16Identity managementYesImplementedUnique identifiers for all users. IAM users with individual credentials. Service accounts with dedicated IAM roles. No shared accounts.
A.5.17Authentication informationYesImplementedStrong password requirements. MFA via authenticator app. API keys with minimum 128-bit entropy. SSH keys for GitLab access. Access key rotation every 90 days.
A.5.18Access rightsYesImplementedAccess provisioned on approval basis. Quarterly access reviews. Immediate revocation on role change or termination. Documented approval workflow.
A.5.19Information security in supplier relationshipsYesImplementedVendor security assessment for all suppliers with access to H33 data (AWS, Stripe, Twilio, Drata). BAA agreements where applicable. Contractual security requirements.
A.5.20Addressing information security within supplier agreementsYesImplementedSecurity requirements included in all vendor agreements. AWS shared responsibility model documented. Stripe PCI compliance verified. DPA agreements in place.
A.5.21Managing information security in the ICT supply chainYesImplementedDependency scanning (cargo audit, npm audit). Pinned versions prevent supply chain substitution. CI pipeline validates dependency integrity. No external FHE/ZK dependencies.
A.5.22Monitoring, review and change management of supplier servicesYesImplementedAWS health dashboard monitoring. Stripe and Twilio status page subscriptions. Quarterly vendor review. Service level monitoring for all critical suppliers.
A.5.23Information security for use of cloud servicesYesImplementedKey control. Comprehensive cloud security policy (A.5.23 doc). AWS us-east-1, VPC isolation, encryption at rest/transit, CloudTrail, Security Groups, IAM least privilege. See Cloud Security Policy.
A.5.24Information security incident management planning and preparationYesImplementedIncident response plan documented with severity levels, escalation paths, communication templates, and recovery procedures. Team trained on procedures.
A.5.25Assessment and decision on information security eventsYesImplementedSecurity event triage procedure with P1-P4 severity classification. Security Officer assesses and classifies all reported events. Documented decision criteria.
A.5.26Response to information security incidentsYesImplementedIncident response procedures with defined SLAs (P1: 15min, P2: 1hr, P3: 4hr, P4: 24hr). Containment, eradication, and recovery procedures documented.
A.5.27Learning from information security incidentsYesImplementedPost-incident review required for all P1/P2 incidents within 5 business days. Root cause analysis, corrective actions, and lessons learned documented and tracked.
A.5.28Collection of evidenceYesImplementedEvidence preservation procedures in incident response plan. CloudTrail log integrity validation. Immutable log storage in S3 with versioning. Chain of custody documentation.
A.5.29Information security during disruptionYesImplementedBusiness continuity plan covers security controls during disruption. Multi-AZ deployment for availability. RDS automated backups with point-in-time recovery. Failover procedures tested.
A.5.30ICT readiness for business continuityYesImplementedMulti-AZ RDS with automated failover. ElastiCache replication. S3 cross-region replication for critical backups. Recovery time objectives (RTO) and recovery point objectives (RPO) documented.
A.5.31Legal, statutory, regulatory and contractual requirementsYesImplementedCompliance requirements register maintained (HIPAA, state privacy laws, NIST FIPS, PCI via Stripe, GDPR for EU customers). Legal review of regulatory changes quarterly.
A.5.32Intellectual property rightsYesImplemented108 patent claims pending. IP assignment in employment agreements. Open-source license compliance tracked. Proprietary cryptographic engine fully H33-owned.
A.5.33Protection of recordsYesImplementedRecord retention policy: 7 years for audit trails, 365 days for operational logs, 90 days online. Encrypted storage (S3 SSE, RDS encryption). Access-controlled per classification.
A.5.34Privacy and protection of PIIYesImplementedPrivacy policy published. DPA available. FHE processing means server never accesses plaintext PII. Data minimization principles applied. HIPAA BAA available for healthcare customers.
A.5.35Independent review of information securityYesPartialSOC 2 Type II audit in progress (Drata + external auditor). ISO 27001 certification planned. Internal reviews conducted by CEO/CISO. External penetration testing planned for Q2 2026.
A.5.36Compliance with policies, rules and standards for information securityYesImplementedDrata continuous monitoring validates compliance across 100+ controls. Policy acknowledgment tracked for all personnel. Non-compliance tracked as security events.
A.5.37Documented operating proceduresYesImplementedOperating procedures documented for deployment, incident response, backup/restore, access provisioning, and key management. Stored in version-controlled repository.

A.6 People Controls (8 controls)

Control Name Appl. Status Justification / Implementation Notes
A.6.1ScreeningYesImplementedBackground checks conducted for all employees prior to hire. References verified. Identity verification completed. Screening proportional to role sensitivity (enhanced for crypto/security roles).
A.6.2Terms and conditions of employmentYesImplementedEmployment agreements include NDA, IP assignment, acceptable use, and information security responsibilities. Contractor agreements include equivalent security obligations.
A.6.3Information security awareness, education and trainingYesImplementedSecurity awareness training at onboarding and annually. Role-specific training for developers (secure coding) and ops (incident response). Phishing awareness campaigns.
A.6.4Disciplinary processYesImplementedDisciplinary process for security policy violations documented in employee handbook. Progressive discipline from warning to termination. Applied consistently.
A.6.5Responsibilities after termination or change of employmentYesImplementedConfidentiality obligations survive termination (NDA). Offboarding checklist includes all access revocation. Post-employment IP restrictions per agreement.
A.6.6Confidentiality or non-disclosure agreementsYesImplementedNDAs required for all employees and contractors. Mutual NDA template for vendors and partners. NDA covers proprietary crypto algorithms, customer data, and business operations.
A.6.7Remote workingYesImplementedRemote work security policy covers: encrypted disk on all devices, VPN for sensitive access, screen lock policy, no public Wi-Fi for production access, secure home network requirements.
A.6.8Information security event reportingYesImplementedKey control. Comprehensive security event reporting procedure with channels (email, Slack, phone), severity levels (P1-P4), escalation paths, and non-retaliation policy. See Security Event Reporting Procedure.

A.7 Physical Controls (14 controls)

H33 operates entirely on cloud infrastructure (AWS). Physical controls are implemented by AWS as part of the shared responsibility model. AWS data centers are SOC 2 Type II and ISO 27001 certified.

Control Name Appl. Status Justification / Implementation Notes
A.7.1Physical security perimetersYesImpl. via AWSAWS data centers have multi-layer physical perimeters with security personnel, fencing, barriers, and surveillance. SOC 2 Type II audited annually.
A.7.2Physical entryYesImpl. via AWSAWS data center access controlled by badge, biometric, and man-trap entry systems. Access logged and monitored 24/7. H33 has no physical data center access.
A.7.3Securing offices, rooms and facilitiesYesImpl. via AWSAWS facilities secured per their SOC 2 / ISO 27001 certifications. H33 remote-first; employee device security policy covers home office requirements.
A.7.4Physical security monitoringYesImpl. via AWSAWS data centers monitored 24/7 with CCTV, intrusion detection, and security personnel. H33 monitors logical access to cloud resources.
A.7.5Protecting against physical and environmental threatsYesImpl. via AWSAWS data centers designed for fire suppression, flood prevention, seismic resilience, and climate control. Multi-AZ deployment protects against single-site failure.
A.7.6Working in secure areasYesImpl. via AWSAWS restricts data center access to authorized personnel. H33 personnel do not access data centers. Remote work policy addresses secure working environment.
A.7.7Clear desk and clear screenYesImplementedClear screen policy: auto-lock after 5 minutes of inactivity. Sensitive documents not printed. Screen privacy filters recommended for public settings.
A.7.8Equipment siting and protectionYesImpl. via AWSAWS manages server equipment siting, cooling, and power. H33 employee devices: encrypted disk, anti-malware, screen lock, and physical security guidance.
A.7.9Security of assets off-premisesYesImplementedEmployee devices: full-disk encryption required, remote wipe capability, VPN for production access. Lost/stolen devices reported immediately per incident response procedure.
A.7.10Storage mediaYesImplementedAWS manages server storage media lifecycle (encryption, sanitization, destruction per NIST 800-88). H33 devices: encrypted storage, secure deletion procedures on decommission.
A.7.11Supporting utilitiesYesImpl. via AWSAWS data centers have redundant power (UPS, generators), cooling (N+1 HVAC), and network connectivity. SLA guarantees per AWS service agreements.
A.7.12Cabling securityYesImpl. via AWSAWS manages data center cabling infrastructure. All H33 data transmission is encrypted (TLS 1.2+) regardless of physical cable security.
A.7.13Equipment maintenanceYesImpl. via AWSAWS maintains server hardware. H33 employee device maintenance: OS updates enforced, scheduled security patch windows, anti-malware updates automatic.
A.7.14Secure disposal or re-use of equipmentYesImplementedAWS handles server hardware disposal per NIST 800-88. H33 devices: secure wipe before disposal/reassignment, encryption key destruction, certificate of destruction for sensitive devices.

A.8 Technological Controls (34 controls)

Control Name Appl. Status Justification / Implementation Notes
A.8.1User endpoint devicesYesImplementedEndpoint security policy: full-disk encryption, auto-lock, anti-malware, OS auto-updates, no unauthorized software. Remote wipe capability for mobile devices.
A.8.2Privileged access rightsYesImplementedPrivileged access (AWS admin, database admin, production deploy) restricted to minimum personnel. MFA required for all privileged access. Logged via CloudTrail. Quarterly review.
A.8.3Information access restrictionYesImplementedAccess restricted by IAM policies, security groups, and application-level authorization. Database access limited to application service role. S3 bucket policies restrict object access.
A.8.4Access to source codeYesImplementedSource code in private GitLab repositories. Access controlled by GitLab groups and roles. Branch protection on main/master. No public read access. IP-restricted for admin operations.
A.8.5Secure authenticationYesImplementedAuth1 multi-factor authentication (OTP via SMS/authenticator). Session management with secure cookies (httpOnly, Secure, SameSite). Rate limiting on auth endpoints. Account lockout after failures.
A.8.6Capacity managementYesImplementedElastic Beanstalk auto-scaling configured. CloudWatch alarms for capacity thresholds (CPU, memory, connections). RDS storage auto-scaling enabled. Load testing before major releases.
A.8.7Protection against malwareYesImplementedEndpoint anti-malware on all devices. Rust memory safety prevents buffer overflow class of attacks. Input validation on all API endpoints. File upload scanning where applicable.
A.8.8Management of technical vulnerabilitiesYesImplementedWeekly cargo audit and npm audit scans. Critical CVEs patched within 48 hours. AWS Inspector for infrastructure scanning. Drata monitors for vulnerability management compliance.
A.8.9Configuration managementYesImplementedInfrastructure configuration managed via Elastic Beanstalk .ebextensions. AWS Config tracks configuration changes. GitLab CI/CD ensures consistent deployments. Configuration drift detection via Drata.
A.8.10Information deletionYesImplementedData deletion procedures per retention policy. Cryptographic key material zeroed on drop (zeroize crate). Database record deletion upon customer request. S3 lifecycle policies for automated expiration.
A.8.11Data maskingYesImplementedFHE inherently masks data (server processes encrypted data, never sees plaintext). Log redaction for secrets, tokens, and PHI. API responses exclude internal identifiers.
A.8.12Data leakage preventionYesPartialFHE prevents server-side data exposure by design. No PHI in logs or error messages. Secret scanning in CI pipeline. DLP tooling for endpoint monitoring planned for Q3 2026.
A.8.13Information backupYesImplementedRDS automated backups (7-day retention, point-in-time recovery). S3 versioning and cross-region replication for critical data. Backup restore tested quarterly.
A.8.14Redundancy of information processing facilitiesYesImplementedMulti-AZ deployment for RDS and ElastiCache. ALB distributes across availability zones. Elastic Beanstalk auto-scaling across AZs. CloudFront global edge network.
A.8.15LoggingYesImplementedComprehensive logging: CloudTrail (all regions), CloudWatch Logs, VPC Flow Logs, ALB access logs, application logs (structured JSON). Log integrity validation enabled.
A.8.16Monitoring activitiesYesImplementedKey control. CloudWatch metrics/alarms, CloudTrail event monitoring, Drata continuous compliance monitoring, file integrity monitoring (SHA-256 baselines). See Monitoring Activities Policy.
A.8.17Clock synchronizationYesImplementedAWS instances synchronize via Amazon Time Sync Service (NTP). All log timestamps in UTC. CloudTrail timestamps from AWS clock source.
A.8.18Use of privileged utility programsYesImplementedPrivileged utilities (database tools, deployment scripts) restricted to authorized personnel. Usage logged. No root access on production instances except through approved processes.
A.8.19Installation of software on operational systemsYesImplementedSoftware installation on production via CI/CD pipeline only. Manual installation prohibited. Base AMI hardened and versioned. Package installation requires deployment approval.
A.8.20Networks securityYesImplementedVPC with public/private subnet isolation. Security groups with least-privilege rules. NACLs on all subnets. No public SSH/RDP. CloudFront WAF rules.
A.8.21Security of network servicesYesImplementedTLS 1.2+ on all network services. ALB with AWS-managed TLS policies. CloudFront HTTPS-only. VPC endpoints for AWS service access (avoids public internet). Service-level security monitoring.
A.8.22Segregation of networksYesImplementedPublic subnet (ALB only) separated from private subnet (app, DB, cache). Security groups enforce inter-tier access rules. No direct internet access from private subnets (NAT gateway for outbound only).
A.8.23Web filteringYesPartialCloudFront WAF with managed rule sets (OWASP, IP reputation, rate limiting). Application-level rate limiting on all public endpoints. Full URL categorization filtering planned for Q3 2026.
A.8.24Use of cryptographyYesImplementedKey control. Proprietary post-quantum cryptographic suite: BFV/CKKS FHE, Dilithium (ML-DSA / FIPS 204), Kyber (ML-KEM / FIPS 203), SPHINCS+ (SLH-DSA / FIPS 205), SHA3-256. AES-256 for storage encryption. TLS 1.2+ for transport. Montgomery NTT for performance.
A.8.25Secure development life cycleYesImplementedSDLC includes security requirements, threat modeling for crypto features, code review (mandatory), automated testing (unit, integration, benchmark), security scanning (cargo/npm audit), and deployment approval gates.
A.8.26Application security requirementsYesImplementedSecurity requirements defined for each application: input validation, parameterized queries, authentication/authorization, encryption, logging. OWASP Top 10 compliance verified.
A.8.27Secure system architecture and engineering principlesYesImplementedDefense in depth: FHE (data never decrypted on server), network isolation (VPC), encryption at rest/transit, IAM least privilege, monitoring. Post-quantum readiness built into architecture from inception.
A.8.28Secure codingYesImplementedKey control. Comprehensive secure coding standards for Rust (constant-time crypto, no unsafe without review, zeroize), Node.js (parameterized queries, input validation, httpOnly cookies), and JavaScript (no eval, CSP, textContent). See Secure Coding Standards.
A.8.29Security testing in development and acceptanceYesImplementedUnit tests for all crypto operations. NIST KAT test vectors for PQ algorithms. Criterion benchmarks detect performance regressions. Integration tests for auth flows. Security scanning in CI pipeline.
A.8.30Outsourced developmentYesImplementedContractor code subject to same review standards. NDA and IP assignment required. No outsourced access to production. Cryptographic code written in-house only (no outsourced FHE/PQC development).
A.8.31Separation of development, test and production environmentsYesPartialProduction isolated in separate AWS environment. Staging environment mirrors production configuration. Development uses local environments. Full environment parity in progress (dedicated staging VPC planned Q2 2026).
A.8.32Change managementYesImplementedAll changes via pull request with mandatory review. CI pipeline validates before deploy. Production deployments require explicit approval. Rollback procedures documented. Change log maintained.
A.8.33Test informationYesImplementedProduction data not used in test environments. Synthetic test data generated for development. NIST test vectors used for crypto validation (public, non-sensitive). PHI never appears in test data.
A.8.34Protection of information systems during audit testingYesPlannedAudit testing procedures to be formalized before first ISO 27001 audit. Drata evidence collection is non-intrusive (read-only API access). Penetration testing rules of engagement to be defined Q2 2026.

Summary of Non-Fully-Implemented Controls

The following controls are not yet fully implemented. Each has a remediation plan with target dates:

Control Name Status Target Date Remediation Plan
A.5.35Independent reviewPartialQ2 2026SOC 2 Type II audit in progress. External pen test scheduled for Q2 2026. ISO 27001 certification audit planned.
A.8.12Data leakage preventionPartialQ3 2026FHE provides strong DLP by design. Endpoint DLP tooling to be evaluated and deployed for employee devices.
A.8.23Web filteringPartialQ3 2026WAF rules active. Full URL categorization and content filtering to be added to CloudFront distribution.
A.8.31Environment separationPartialQ2 2026Production isolated. Dedicated staging VPC with full production parity to be provisioned.
A.8.34Audit testing protectionPlannedQ2 2026Formal procedures to be documented before first external ISO audit. Rules of engagement for pen testing to be defined.

Document Control

Version Date Author Change Description
1.0March 8, 2026Eric BeansInitial Statement of Applicability — all 93 ISO 27001:2022 Annex A controls assessed

Next scheduled review: March 2027

Questions about this document?

Contact our Security team at security@h33.ai